SIKM - a smart cryptographic key management framework

被引:3
作者
Chaeikar, Saman Shojae [1 ]
Ahmadi, Ali [2 ]
Karamizadeh, Sasan [3 ]
Chaeikar, Nakisa Shoja [1 ]
机构
[1] Iranians Univ, Fac Comp Engn, Dept Informat Secur, E Inst Higher Educ, Tehran, Iran
[2] KN Toosi Univ Technol, Fac Comp Engn, Dept Artificial Intelligence, Tehran, Iran
[3] ICT Res Inst, Dept ICT Secur, Tehran, Iran
来源
OPEN COMPUTER SCIENCE | 2022年 / 12卷 / 01期
关键词
cryptographic key management; symmetric key; secure communications; key exchange; key refreshment; PROTOCOL; SCHEME;
D O I
10.1515/comp-2020-0167
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals - minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.
引用
收藏
页码:17 / 26
页数:10
相关论文
共 32 条
  • [1] Alizadeh M., 2012, RFID 16 WSEAS INT C
  • [2] Barker E., 2018, NIST Special Publication (SP) 800-57
  • [3] Chaeikar Saman Shojae, 2021, International Journal of Internet Technology and Secured Transactions, V11, P176, DOI 10.1504/IJITST.2021.113519
  • [4] Chaeikar Saman Shojae, 2010, Proceedings Second International Conference on Computer Research and Development (ICCRD 2010), P265, DOI 10.1109/ICCRD.2010.54
  • [5] Chaeikar S.S., 2010, SECUR MANAGE, P204
  • [6] Chaeikar S.S., 2012, CRYPTOGRAPH SECURITY, V203, P203
  • [7] Security Principles and Challenges in Electronic Voting
    Chaeikar, Saman Shojae
    Jolfaei, Alireza
    Mohammad, Nazeeruddin
    Ostovari, Pouya
    [J]. 2021 IEEE 25TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2021), 2021, : 38 - 45
  • [8] An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
    Chaeikar, Saman Shojae
    Alizadeh, Mojtaba
    Tadayon, Mohammad Hesam
    Jolfaei, Alireza
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10158 - 10171
  • [9] PFW: Polygonal Fuzzy Weighted-An SVM Kernel for the Classification of Overlapping Data Groups
    Chaeikar, Saman Shojae
    Manaf, Azizah Abdul
    Alarood, Ala Abdulsalam
    Zamani, Mazdak
    [J]. ELECTRONICS, 2020, 9 (04)
  • [10] A Key Management Scheme for MobileWireless Sensor Networks
    Gandino, Filippo
    Celozzi, Cesare
    Rebaudengo, Maurizio
    [J]. APPLIED SCIENCES-BASEL, 2017, 7 (05):